• No results found

software implementations

Fully  Automated  Differential  Fault  Analysis  on  Software  Implementations  of  Block  Ciphers

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers

... Our contribution. In this work, we focus on the fully automated DFA attack on software implementations of cryptographic algorithms. We develop a tool that analyzes assembly code statically, constructs an ...

29

On  the  Cost  of  Lazy  Engineering  for  Masked  Software  Implementations

On the Cost of Lazy Engineering for Masked Software Implementations

... Abstract. Masking is one of the most popular countermeasures to mitigate side-channel analysis. Yet, its deployment in actual cryptographic devices is well known to be challeng- ing, since designers have to ensure that ...

19

Near-Real time analysis of seismic data of active volcanoes: Software implementations of time sequence data analysis

Near-Real time analysis of seismic data of active volcanoes: Software implementations of time sequence data analysis

... a software-based quality control system that moni- tors volcano activity in near-real ...developed software-based quality control to the real-time monitoring of Teide – Pico Viejo volcanic complex (Spain) ...

6

User-Centered Design in Procured Software Implementations

User-Centered Design in Procured Software Implementations

... COTS implementations? How do usability specialists keep project teams thinking about end- users when these teams are encouraged to use purchased products out-of-the-box and to configure them? ...

15

Start  your  ENGINEs:  dynamically  loadable  contemporary  crypto

Start your ENGINEs: dynamically loadable contemporary crypto

... for software im- plementations: (1) they allow to replace compiled-in software implementations in case of bugs, vulnerabilities or sub-optimal performances with newer alternative ...

16

Practical  Applications  of  Improved  Gaussian  Sampling  for  Trapdoor  Lattices

Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices

... present software implementations of the Gentry-Peikert-Vaikuntanathan (GPV) digital signature, IBE and ciphertext- policy attribute-based encryption (CP-ABE) schemes based on an efficient Gaussian sampling ...

22

PubMedCentral-PMC5051647.pdf

PubMedCentral-PMC5051647.pdf

... The open source software implementations of Theriault et al. (2014) represent an affordable alternative to several commercially available packages; however, the workflow still assumes the use of two costly ...

9

Side-Channel  Analysis  of  MAC-Keccak  Hardware  Implementations

Side-Channel Analysis of MAC-Keccak Hardware Implementations

... against software implementations of MAC-Keccak to retrieve the key, with the security assessment of hardware implementations remaining an open ...

13

Elliptic-curve cryptographic architectures for system-on-chip based on field programmable gate arrays

Elliptic-curve cryptographic architectures for system-on-chip based on field programmable gate arrays

... algorithm. Software implementations of cryptographic algorithms often spend the majority of their execution time in a few performance-critical code sections (Hankerson et ...

19

A Tool for Software Effort Estimation

A Tool for Software Effort Estimation

... in software cost and effort estimation is tedious task in software ...of software and effort applied to develop it. However, software project estimation can be transformed from a black art to ...

5

Smart Grid Technologies and Implementations

Smart Grid Technologies and Implementations

... Since 2010, papers and researches on smart grid have paid attention to intelligent system monitoring. Some of the last implementations of Power system frequency monitoring network (FNET) applications on wide-area ...

188

Linear  Regression  Side  Channel  Attack  Applied  on  Constant  XOR

Linear Regression Side Channel Attack Applied on Constant XOR

... Nowadays, embedded devices such as smart cards, mobile phones, RFID tags and even sensor networks are widely used in our daily lives. Though these devices are extensively used, the sensitive data con- tained in them ...

11

Framework Implementation on Managing Visitors with Smart Card Authentication at Malaysia National Park

Framework Implementation on Managing Visitors with Smart Card Authentication at Malaysia National Park

... Abstract— Smart card applications are not widely implemented for auto identification of customers in leisure and entertainment industry in Malaysia. Lack of technological knowledge on the capability of the smart card ...

8

High speed hardware architecture for implementations of multivariate signature generations on FPGAs

High speed hardware architecture for implementations of multivariate signature generations on FPGAs

... This study originates from a need to speed up signature generations of multivariate scheme, since the efficiency of implementations should be improved as a quantum- resistance cryptosystems. Specifically, we ...

9

RDA in Europe : Implementations and perceptions

RDA in Europe : Implementations and perceptions

... Once the case studies were sorted into the three groups, the US articles were analysed by thematically coding them in six themes based on the preliminary literature review and the resear[r] ...

59

DEUCE : a test-bed for evaluating ESL competence criteria

DEUCE : a test-bed for evaluating ESL competence criteria

... By determining each student’s ESL competence in advance, by means of an independent system (e.g., CELT), we are able to provide DEUCE with a rating for each subject’s competence. Against these measures, DEUCE engages ...

5

The Implementation of Enterprise Resource Planning Systems in Different National and Organisational Cultures

The Implementation of Enterprise Resource Planning Systems in Different National and Organisational Cultures

... Contributionsfor ERP implementations: A methodis proposedfor eliciting elementsof organisationaland national culture that are critical to ERP implementations; A set of cultural predictio[r] ...

254

Instance Strategy for IT Implementations

Instance Strategy for IT Implementations

... IT implementations have also become increasingly ...IT implementations need to cater users across multiple geographies, support complex business requirements, manage large data volumes and need to be ...

6

NeBSS: Semi-Automated Parcellation of Neonatal Structural Brain MRI

NeBSS: Semi-Automated Parcellation of Neonatal Structural Brain MRI

... an open source, neuroimaging specific processing pipeline engine designed to create transparent and reproducible data processing graphs. Nipype contains built-in interfaces to the vast majority of existing neuroimaging ...

11

Performance Comparison of Software Transactional Memory Implementations

Performance Comparison of Software Transactional Memory Implementations

... Shavit and Touitou [3] proposed the first ever software transactional memory. Their STM implementation was non-blocking, did no recursive helping and could be implemented using limited hardware support. To measure ...

56

Show all 10000 documents...

Related subjects